Issued Patents All Time
Showing 26–50 of 67 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8539548 | Tiered network policy configuration with policy customization control | Kimberly T. Bailey, Jeffrey B. Cates, Mark T. Wright | 2013-09-17 |
| 8489755 | Technique of detecting denial of service attacks | Patricia Jakubik, Patrick Michael LiVecchi | 2013-07-16 |
| 8458763 | Method of automating and personalizing systems to satisfy security requirements in an end-to-end service landscape | Sivaram Gottimukkala, Lap T. Huynh, Dinakaran Joseph, Michael S. Law, Wesley McMillan Devine +2 more | 2013-06-04 |
| 8458768 | Policy-based security certificate filtering | Roy F. Brabson, Barry Mosakowski | 2013-06-04 |
| 8424053 | Method of dynamically updating network security policy rules when new network resources are provisioned in a service landscape | Sivaram Gottimukkala, Lap T. Huynh, Dinakaran Joseph, Wesley McMillan Devine, Michael Behrendt +1 more | 2013-04-16 |
| 8250229 | Internet protocol security (IPSEC) packet processing for multiple clients sharing a single network address | Joyce Anne Porter, David J. Wierbowski | 2012-08-21 |
| 8220052 | Application based intrusion detection | Lap T. Huynh | 2012-07-10 |
| 8199916 | Selectively loading security enforcement points with security association information | Christopher Meyer, Wuchieh J. Jong | 2012-06-12 |
| 8195806 | Managing remote host visibility in a proxy server environment | Jeffery L. Smith | 2012-06-05 |
| 8141126 | Selective IPsec security association recovery | Curtis M. Gearhart, Christopher Meyer, David J. Wierbowski | 2012-03-20 |
| 7996544 | Technique of detecting denial of service attacks | Patricia Jakubik, Patrick Michael LiVecchi | 2011-08-09 |
| 7992200 | Secure sharing of transport layer security session keys with trusted enforcement points | David G. Kuehr-McLaren | 2011-08-02 |
| 7984479 | Policy-based security certificate filtering | Roy F. Brabson, Barry Mosakowski | 2011-07-19 |
| 7962652 | Detecting network topology when negotiating IPsec security associations that involve network address translation | Wuchieh J. Jong, Joyce Anne Porter, David J. Wierbowski | 2011-06-14 |
| 7873829 | Offload processing for secure data transfer | Roy F. Brabson, Mark R. Gambino | 2011-01-18 |
| 7873991 | Technique of defending against network flooding attacks using a connectionless protocol | Kira Sterling Attwood, Chien-En Sun | 2011-01-18 |
| 7870384 | Offload processing for secure data transfer | Roy F. Brabson, Mark R. Gambino | 2011-01-11 |
| 7702785 | Methods, systems and computer program products for selectively allowing users of a multi-user system access to network resources | David Bruton, Adolfo Francisco Rodriguez | 2010-04-20 |
| 7656795 | Preventing duplicate sources from clients served by a network address port translator | Patricia Jakubik, Joyce Anne Porter, David J. Wierbowski | 2010-02-02 |
| 7519721 | Computer program products for security processing inbound communications in a cluster computing environment | James Russell Godwin | 2009-04-14 |
| 7441119 | Offload processing for secure data transfer | Roy F. Brabson, Mark R. Gambino | 2008-10-21 |
| 7426566 | Methods, systems and computer program products for security processing inbound communications in a cluster computing environment | James Russell Godwin | 2008-09-16 |
| 7340530 | Methods, for providing data from network secure communications in a cluster computing environment | James Russell Godwin, David Anthony Herr | 2008-03-04 |
| 7246233 | Policy-driven kernel-based security implementation | Roy F. Brabson | 2007-07-17 |
| 7222366 | Intrusion event filtering | David Bruton, Patricia Jakubik, Patrick Michael LiVecchi | 2007-05-22 |